Search results for: online dispute resolution
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4196

Search results for: online dispute resolution

1946 Binding Studies and Structure Determination of the Recombinantly Produced Type-II 3-Dehydroquinate Dehydratase from Acinetobacter Baumannii

Authors: Naseer Iqbal, Mukesh Kumar, Pradeep Sharma, Satya Prakash Yadav, Punit Kaur, Sujata Sharma, T. P. Singh

Abstract:

Dehydroquinase (3-dehydroquinate dehydratase, DHQD, EC 4.2.1.10) is involved in shikimate pathway and catalyzes the conversion of dehydroquinate to dehydroshikimate. Shikimate pathway is important drug target as this pathway is absent in mammals. DHQD from Acinetobacter baumannii (AbDHQD) was cloned, expressed and purified to homogeneity. The binding studies showed that compounds quinic acid and citrazinic acid bound to AbDHQD at micromolar concentrations. AbDHQD was crystallized using 30% PEG-3350, 50mM tris-HCl, and 1.0M MgSO4 at PH 8.0. Crystals of AbDHQD were stabilized by transferring them into reservoir solution to which 25% glycerol was added for data collection at 100K. The X-ray intensity data were collected to 2.0Å resolution. The crystals belong to monoclinic space group P21 with cell dimensions, a = 82.3, b = 95.3, c = 132.3Å and β = 95.7°. The structure was solved with molecular replacement method and refined to Rcryst/Rfree factors of 0.200/0.232. The structures of 12 crystallographically independent molecules in the asymmetry unit were identical with r.m.s shifts for the C atoms ranging from 0.3 Å to 0.8 Å. They formed a dodecamer with four trimers arranged in a tetrahedral manner. The classical lid adopted an open conformation although a sulfate ion was observed in the substrate binding site. As a result of which, the compounds quinic acid and citrazinic acid did not bind to AbDHQD.

Keywords: acinetobacter Bauman Nii, dehydroquinate dehydratase, dodecamer, open conformation

Procedia PDF Downloads 361
1945 Teaching College Classes with Virtual Reality

Authors: Penn P. Wu

Abstract:

Recent advances in virtual reality (VR) technologies have made it possible for students to experience a virtual on-the-scene or virtual in-person observation of an educational event. In an experimental class, the author uses VR, particularly 360° videos, to virtually engage students in an event, through a wide spectrum of educational resources, such s a virtual “bystander.” Students were able to observe the event as if they were physically on site, although they could not intervene with the scene. The author will describe the adopted equipment, specification, and cost of building them as well as the quality of VR. The author will discuss (a) feasibility, effectiveness, and efficiency of using VR as a supplemental technology to teach college students and criteria and methodologies used by the authors to evaluate them; (b) barriers and issues of technological implementation; and (c) pedagogical practices learned through this experiment. The author also attempts to explore (a) how VR could provide an interactive virtual in-person learning experience; (b) how VR can possibly change traditional college education and online education; (c) how educators and balance six critical factors: cost, time, technology, quality, result, and content.

Keywords: learning with VR, virtual experience of learning, virtual in-person learning, virtual reality for education

Procedia PDF Downloads 308
1944 The Perceptions of Parents Regarding the Appropriateness of the Early Childhood Financial Literacy Program for Children 3 to 6 Years of Age Presented at an Early Childhood Facility in South Africa: A Case Study

Authors: M. Naude, R. Joubert, A. du Plessis, S. Pelser, M. Trollip

Abstract:

Context: The study focuses on the perceptions of South African parents and teachers regarding a play-based financial literacy program for children aged 3 to 6 years at an early childhood facility. It emphasizes the importance of early interventions in financial education to reduce poverty and inequality. Research Aim: To explore how parental involvement in teaching money management concepts to young children can support financial literacy education both at school and at home. Methodology: A qualitative deductive case study was conducted at a South African early childhood facility involving 90 children, their teachers and their families. Thematic content analysis of online survey responses and focus group discussions with teachers were used to identify patterns and themes related to participants’ perceptions of the financial literacy program. Validity: The study's validity and reproducibility are ensured by the depth and honesty of the data, participant involvement, and the inquirer's objectivity. Reliability aligns with the interpretive paradigm of this study, while transparency in data gathering and analysis enhances its trustworthiness. Credibility is further supported by using two triangulation methods: focus group interviews with teachers and open-ended questionnaires from parents. Findings: Parents reported overall satisfaction with the program and highlighted the development of essential money management skills in their children. They emphasized the collaborative role of home and school environments in fostering financial literacy in early childhood. Teachers reported that communication and interaction with the parents increased and grew. Healthy and positive relationships were established between the teachers and the parents which contributed to the success of the classroom financial literacy program. Theoretical Importance: The study underscores the significance of play-based financial literacy education in early childhood and the critical role of parental involvement in reinforcing money management concepts. It contributes to laying a solid foundation for children's future financial well-being. Data Collection: Data was collected through an online survey administered to parents of children participating in the financial literacy program over a period of 10 weeks. Focus group discussions were utilized with the teachers of each class after the conclusion of the program. Analysis Procedures: Thematic content analysis was applied to the survey responses to identify patterns, themes, and insights related to the participants’ perceptions of the program's effectiveness in teaching money management concepts to young children. Question Addressed: How does parental involvement in teaching money management concepts to young children support financial literacy education in early childhood? Conclusion: The study highlights the positive impact of a play-based financial literacy program for children aged 3 to 6 years and underscores the importance of collaboration between home and school environments in fostering financial literacy skills.

Keywords: early childhood, financial literacy, money management, parent involvement, play-based learning, South Africa

Procedia PDF Downloads 14
1943 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria

Authors: Washima Tuleun

Abstract:

Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.

Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing

Procedia PDF Downloads 29
1942 Single Atom Manipulation with 4 Scanning Tunneling Microscope Technique

Authors: Jianshu Yang, Delphine Sordes, Marek Kolmer, Christian Joachim

Abstract:

Nanoelectronics, for example the calculating circuits integrating at molecule scale logic gates, atomic scale circuits, has been constructed and investigated recently. A major challenge is their functional properties characterization because of the connecting problem from atomic scale to micrometer scale. New experimental instruments and new processes have been proposed therefore. To satisfy a precisely measurement at atomic scale and then connecting micrometer scale electrical integration controller, the technique improvement is kept on going. Our new machine, a low temperature high vacuum four scanning tunneling microscope, as a customer required instrument constructed by Omicron GmbH, is expected to be scaling down to atomic scale characterization. Here, we will present our first testified results about the performance of this new instrument. The sample we selected is Au(111) surface. The measurements have been taken at 4.2 K. The atomic resolution surface structure was observed with each of four scanners with noise level better than 3 pm. With a tip-sample distance calibration by I-z spectra, the sample conductance has been derived from its atomic locally I-V spectra. Furthermore, the surface conductance measurement has been performed using two methods, (1) by landing two STM tips on the surface with sample floating; and (2) by sample floating and one of the landed tips turned to be grounding. In addition, single atom manipulation has been achieved with a modified tip design, which is comparable to a conventional LT-STM.

Keywords: low temperature ultra-high vacuum four scanning tunneling microscope, nanoelectronics, point contact, single atom manipulation, tunneling resistance

Procedia PDF Downloads 280
1941 Using Geospatial Analysis to Reconstruct the Thunderstorm Climatology for the Washington DC Metropolitan Region

Authors: Mace Bentley, Zhuojun Duan, Tobias Gerken, Dudley Bonsal, Henry Way, Endre Szakal, Mia Pham, Hunter Donaldson, Chelsea Lang, Hayden Abbott, Leah Wilcynzski

Abstract:

Air pollution has the potential to modify the lifespan and intensity of thunderstorms and the properties of lightning. Using data mining and geovisualization, we investigate how background climate and weather conditions shape variability in urban air pollution and how this, in turn, shapes thunderstorms as measured by the intensity, distribution, and frequency of cloud-to-ground lightning. A spatiotemporal analysis was conducted in order to identify thunderstorms using high-resolution lightning detection network data. Over seven million lightning flashes were used to identify more than 196,000 thunderstorms that occurred between 2006 - 2020 in the Washington, DC Metropolitan Region. Each lightning flash in the dataset was grouped into thunderstorm events by means of a temporal and spatial clustering algorithm. Once the thunderstorm event database was constructed, hourly wind direction, wind speed, and atmospheric thermodynamic data were added to the initiation and dissipation times and locations for the 196,000 identified thunderstorms. Hourly aerosol and air quality data for the thunderstorm initiation times and locations were also incorporated into the dataset. Developing thunderstorm climatologies using a lightning tracking algorithm and lightning detection network data was found to be useful for visualizing the spatial and temporal distribution of urban augmented thunderstorms in the region.

Keywords: lightning, urbanization, thunderstorms, climatology

Procedia PDF Downloads 75
1940 Kinoform Optimisation Using Gerchberg- Saxton Iterative Algorithm

Authors: M. Al-Shamery, R. Young, P. Birch, C. Chatwin

Abstract:

Computer Generated Holography (CGH) is employed to create digitally defined coherent wavefronts. A CGH can be created by using different techniques such as by using a detour-phase technique or by direct phase modulation to create a kinoform. The detour-phase technique was one of the first techniques that was used to generate holograms digitally. The disadvantage of this technique is that the reconstructed image often has poor quality due to the limited dynamic range it is possible to record using a medium with reasonable spatial resolution.. The kinoform (phase-only hologram) is an alternative technique. In this method, the phase of the original wavefront is recorded but the amplitude is constrained to be constant. The original object does not need to exist physically and so the kinoform can be used to reconstruct an almost arbitrary wavefront. However, the image reconstructed by this technique contains high levels of noise and is not identical to the reference image. To improve the reconstruction quality of the kinoform, iterative techniques such as the Gerchberg-Saxton algorithm (GS) are employed. In this paper the GS algorithm is described for the optimisation of a kinoform used for the reconstruction of a complex wavefront. Iterations of the GS algorithm are applied to determine the phase at a plane (with known amplitude distribution which is often taken as uniform), that satisfies given phase and amplitude constraints in a corresponding Fourier plane. The GS algorithm can be used in this way to enhance the reconstruction quality of the kinoform. Different images are employed as the reference object and their kinoform is synthesised using the GS algorithm. The quality of the reconstructed images is quantified to demonstrate the enhanced reconstruction quality achieved by using this method.

Keywords: computer generated holography, digital holography, Gerchberg-Saxton algorithm, kinoform

Procedia PDF Downloads 533
1939 Digital Nudge, Social Proof Nudge and Trust on Brand loyalty

Authors: Mirza Amin Ul Haq

Abstract:

Purpose – the purpose of conducting this research is to check the impact of nudges constructs, whether they create an encouragement factor with consumer brand loyalty and relating of word-of-mouth power have some kind of effect with all independent variables. Desin/Methodology/Approach – this study adopted the four constructs (i.e., Digital Nudge, Social Proof Nudge, Trust, and the mediator Word of Mouth) and explore its effect and connection with Brand Loyalty. A total of 390 respondents were selected for self-administrated questionnaire to obtain the finding of the research. Findings – the impact and cause between the constructs were done through structural equation modeling. The findings show a positive impact of social proof nudge and word of mouth whereas, digital nudge and trust have the weaker influence on the consumer choices when talk about brand loyalty. Originality/Value – Further implication for research and its marketing strategies in the field of clothing industry creating brand loyalty with customer.

Keywords: nudge, digital nudge, social proof, online buying, brand loyalty, trust, word of mouth

Procedia PDF Downloads 111
1938 Ideology Shift in Political Translation

Authors: Jingsong Ma

Abstract:

In political translation, ideology plays an important role in conveying implications accurately. Ideological collisions can occur in political translation when there existdifferences of political environments embedded in the translingual political texts in both source and target languages. To reach an accurate translationrequires the translatorto understand the ideologies implied in (and often transcending) the texts. This paper explores the conditions, procedure, and purpose of processingideological collision and resolution of such issues in political translation. These points will be elucidated by case studies of translating English and Chinese political texts. First, there are specific political terminologies in certain political environments. These terminological peculiarities in one language are often determined by ideological elements rather than by syntactical and semantical understanding. The translation of these ideological-loaded terminologiesis a process and operation consisting of understanding the ideological context, including cultural, historical, and political situations. This will be explained with characteristic Chinese political terminologies and their renderings in English. Second, when the ideology in the source language fails to match with the ideology in the target language, the decisions to highlight or disregard these conflicts are shaped by power relations, political engagement, social context, etc. It thus is necessary to go beyond linguisticanalysis of the context by deciphering ideology in political documents to provide a faithful or equivalent rendering of certain messages. Finally, one of the practical issues is about equivalence in political translation by redefining the notion of faithfulness and retainment of ideological messages in the source language in translations of political texts. To avoid distortion, the translator should be liberated from grip the literal meaning, instead diving into functional meanings of the text.

Keywords: translation, ideology, politics, society

Procedia PDF Downloads 111
1937 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 138
1936 Installing Cloud Computing Model for E-Businesses in Small Organizations

Authors: Khader Titi

Abstract:

Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.

Keywords: E-commerce, cloud computing, B2C, SaaS

Procedia PDF Downloads 317
1935 The Influence of E-Health Education on Professional Practice: A Qualitative Study

Authors: Sisira Edirippulige, Anthony C. Smith, Sumudu Wickramasinghe, Nigel R. Armfield

Abstract:

Background: E-Health is steadily integrating into modern health services, making significant changes in the way health services are traditionally delivered. To work in this new environment, healthcare workers are required to have new knowledge, skills, and competencies specific to e-Health. The aim of this study was to understand the self-reported perceptions of graduates regarding the influence of an e-Health postgraduate program on their professional careers. Methods: All graduates from 2005 to 2015 were surveyed using an online questionnaire that consisted of a mixture of closed and open-ended questions. Results: The number of participants in the study was 32. Response rate was 62%. Graduates thought that the postgraduate e-Health program had an influence on their professional practice. The majority of the participants mentioned that they had worked in the e-Health field since their graduation. Their professional roles mainly involved implementation of e-Health in health service settings and the use of e-Health in clinical practice. Conclusions: While e-Health may be steadily integrating into modern health services, e-Health specific job opportunities are still relatively limited. E-Health workforce development must be given priority.

Keywords: e-health, postgraduate education, clinical practice, curriculum

Procedia PDF Downloads 161
1934 Design of a New Package for Saffron Using Kansei Engineering

Authors: Sotiris Papantonopoulos, Marianna Bortziou

Abstract:

This study aimed at developing a new package of saffron using emotional design and specifically the Kansei Engineering method. Kansei Engineering is a proactive product development methodology, which aims to improve the product development process and to translate consumers' feelings and image of a product into design elements. A survey was conducted with two major purposes: (1) to determine the target group of saffron use and to collect information about the adequacy of the product’s promotion and the importance of its packaging, (2) to collect the most important properties of a package according to consumers and to evaluate the existing saffron packages according to these properties (benchmarking). The interaction with the general public conducted by the distribution of online questionnaires and personal interviews as well as the statistical analysis of the results were performed using the SPSS software. The results of the survey were used in all stages of Kansei Engineering. Based on the results, a new saffron package was designed by using various designing and image processing software. This improved package is expected to achieve a better promotion and increased sales of the product.

Keywords: design, emotional design, Kansei Engineering, packaging, saffron

Procedia PDF Downloads 162
1933 The Predictors of Self-Esteem among Business School Students

Authors: Suchitra Pal, Arjun Mitra

Abstract:

Objective: The purpose of this empirical study is to ascertain if gender, personality traits and social support predict the self-esteem amongst business school students. Method: The study was conducted through an online survey administered on 160 business school students of which equal-number of males and females were taken, with controls for education and family income status. The participants were contacted through emails. Data was gathered and statistically analyzed to determine the relationship between the variables. Results: The results showed that gender was not associated with self-esteem. Whilst all the personality and social support factors were found to be significantly inter-correlated with self-esteem, only extraversion, openness to new experiences, conscientiousness, emotional stability and total perceived social support were found to predict self-esteem. Conclusion: The findings were explained in the light of existing conceptualizations in the field of self-concept. Recommendations for early identification and interventions for a population with lower self-esteem levels have been made based on findings of the study. Major implications for researchers and practitioners are discussed.

Keywords: self-esteem, personality, social support, gender, self-concept

Procedia PDF Downloads 503
1932 The Impact of Gamification on Self-Assessment for English Language Learners in Saudi Arabia

Authors: Wala A. Bagunaid, Maram Meccawy, Arwa Allinjawi, Zilal Meccawy

Abstract:

Continuous self-assessment becomes crucial in self-paced online learning environments. Students often depend on themselves to assess their progress; which is considered an essential requirement for any successful learning process. Today’s education institutions face major problems around student motivation and engagement. Thus, personalized e-learning systems aim to help and guide the students. Gamification provides an opportunity to help students for self-assessment and social comparison with other students through attempting to harness the motivational power of games and apply it to the learning environment. Furthermore, Open Social Student Modeling (OSSM) as considered as the latest user modeling technologies is believed to improve students’ self-assessment and to allow them to social comparison with other students. This research integrates OSSM approach and gamification concepts in order to provide self-assessment for English language learners at King Abdulaziz University (KAU). This is achieved through an interactive visual representation of their learning progress.

Keywords: e-learning system, gamification, motivation, social comparison, visualization

Procedia PDF Downloads 152
1931 PM10 Chemical Characteristics in a Background Site at the Universidad Libre Bogotá

Authors: Laura X. Martinez, Andrés F. Rodríguez, Ruth A. Catacoli

Abstract:

One of the most important factors for air pollution is that the concentrations of PM10 maintain a constant trend, with the exception of some places where that frequently surpasses the allowed ranges established by Colombian legislation. The community that surrounds the Universidad Libre Bogotá is inhabited by a considerable number of students and workers, all of whom are possibly being exposed to PM10 for long periods of time while on campus. Thus, the chemical characterization of PM10 found in the ambient air at the Universidad Libre Bogotá was identified as a problem. A Hi-Vol sampler and EPA Test Method 5 were used to determine if the quality of air is adequate for the human respiratory system. Additionally, quartz fiber filters were utilized during sampling. Samples were taken three days a week during a dry period throughout the months of November and December 2015. The gravimetric analysis method was used to determine PM10 concentrations. The chemical characterization includes non-conventional carcinogenic pollutants. Atomic absorption spectrophotometry (AAS) was used for the determination of metals and VOCs were analyzed using the FTIR (Fourier transform infrared spectroscopy) method. In this way, concentrations of PM10, ranging from values of 13 µg/m3 to 66 µg/m3, were obtained; these values were below standard conditions. This evidence concludes that the PM10 concentrations during an exposure period of 24 hours are lower than the values established by Colombian law, Resolution 610 of 2010; however, when comparing these with the limits set by the World Health Organization (WHO), these concentrations could possibly exceed permissible levels.

Keywords: air quality, atomic absorption spectrophotometry, gas chromatography, particulate matter

Procedia PDF Downloads 256
1930 Student Performance and Confidence Analysis on Education Virtual Environments through Different Assessment Strategies

Authors: Rubén Manrique, Delio Balcázar, José Parrado, Sebastián Rodríguez

Abstract:

Hand in hand with the evolution of technology, education systems have moved to virtual environments to provide increased coverage and facilitate the access to education. However, measuring student performance in virtual environments presents significant challenges to ensure students are acquiring the expected skills. In this study, the confidence and performance of engineering students in virtual environments is analyzed through different evaluation strategies. The effect of the assessment strategy in student confidence is identified using educational data mining techniques. Four assessment strategies were used. First, a conventional multiple choice test; second, a multiple choice test with feedback; third, a multiple choice test with a second chance; and fourth; a multiple choice test with feedback and second chance. Our results show that applying testing with online feedback strategies can influence positively student confidence.

Keywords: assessment strategies, educational data mining, student performance, student confidence

Procedia PDF Downloads 354
1929 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 487
1928 Social Media Marketing Efforts and Hospital Brand Equity: An Empirical Investigation

Authors: Abrar R. Al-Hasan

Abstract:

Despite the widespread use of social media by consumers and marketers, empirical research investigating their economic value in the healthcare industry still lags. This study explores the impact of the use of social media marketing efforts on a hospital's brand equity and, ultimately, consumer response. Using social media data from Twitter and Facebook, along with an online and offline survey methodology, data is analyzed using logistic regression models. A random sample of (728) residents of the Kuwaiti population is used. The results of this study found that social media marketing efforts (SMME) in terms of use and validation lead to higher hospital brand equity and in turn, patient loyalty and patient visit. The study highlights the impact of SMME on hospital brand equity and patient response. Healthcare organizations should guide their marketing efforts to better manage this new way of marketing and communicating with patients to enhance their consumer loyalty and financial performance.

Keywords: brand equity, healthcare marketing, patient visit, social media, SMME

Procedia PDF Downloads 173
1927 Indirect Relationship between Perfectionism and Depression through Self-Silencing and Guilt: A Cross-Cultural Study

Authors: Elham Davoodi, Kylie King, Laura Jobson

Abstract:

Depression is one of the most common mental health disorders. Self-silencing theory adopts a socio-cultural lens to examine the development and maintenance of depression. Self-silencing can be a vulnerability factor in depression, and personality vulnerabilities (e.g., perfectionism) and moral emotions (e.g., guilt) are strongly related to self-silencing and depression. Yet, the relationships between all four variables among different cultural groups are not clear. We aimed to address this gap by examining whether perfectionism and depression are related indirectly through self-silencing and guilt and whether cultural group moderates these associations. Participants (N=288) from either European Australian or Iranian Australian cultural backgrounds completed an online survey assessing self-silencing, guilt, perfectionism, and depression. First, we found an indirect relationship between perfectionism and depression through self-silencing. Second, using a serial mediation model, we found an indirect association between perfectionism and depression through self-silencing and guilt. There was no evidence that cultural groups moderated these indirect relationships. Our findings leave an important question for future longitudinal studies to answer; that is, whether the association between self-silencing and depression is oversimplified and whether moral emotions in this relationship have been overlooked.

Keywords: perfectionism, depression, self-silencing, culture, guilt

Procedia PDF Downloads 8
1926 Compact LWIR Borescope Sensor for Surface Temperature of Engine Components

Authors: Andy Zhang, Awnik Roy, Trevor B. Chen, Bibik Oleksandr, Subodh Adhikari, Paul S. Hsu

Abstract:

The durability of a combustor in gas-turbine enginesrequiresa good control of its component temperatures. Since the temperature of combustion gases frequently exceeds the melting point of the combustion liner walls, an efficient air-cooling system is significantly important to elongatethe lifetime of liner walls. To determine the effectiveness of the air-cooling system, accurate 2D surface temperature measurement of combustor liner walls is crucial for advanced engine development. Traditional diagnostic techniques for temperature measurement, such as thermocouples, thermal wall paints, pyrometry, and phosphors, have shown disadvantages, including being intrusive and affecting local flame/flow dynamics, potential flame quenching, and physical damages to instrumentation due to harsh environments inside the combustor and strong optical interference from strong combustion emission in UV-Mid IR wavelength. To overcome these drawbacks, a compact and small borescope long-wave-infrared (LWIR) sensor is developed to achieve two-dimensional high-spatial resolution, high-fidelity thermal imaging of 2D surface temperature in gas-turbine engines, providing the desired engine component temperature distribution. The compactLWIRborescope sensor makes it feasible to promote the durability of combustor in gas-turbine engines.

Keywords: borescope, engine, long-wave-infrared, sensor

Procedia PDF Downloads 137
1925 Automated Process Quality Monitoring and Diagnostics for Large-Scale Measurement Data

Authors: Hyun-Woo Cho

Abstract:

Continuous monitoring of industrial plants is one of necessary tasks when it comes to ensuring high-quality final products. In terms of monitoring and diagnosis, it is quite critical and important to detect some incipient abnormal events of manufacturing processes in order to improve safety and reliability of operations involved and to reduce related losses. In this work a new multivariate statistical online diagnostic method is presented using a case study. For building some reference models an empirical discriminant model is constructed based on various past operation runs. When a fault is detected on-line, an on-line diagnostic module is initiated. Finally, the status of the current operating conditions is compared with the reference model to make a diagnostic decision. The performance of the presented framework is evaluated using a dataset from complex industrial processes. It has been shown that the proposed diagnostic method outperforms other techniques especially in terms of incipient detection of any faults occurred.

Keywords: data mining, empirical model, on-line diagnostics, process fault, process monitoring

Procedia PDF Downloads 401
1924 Spatial Object-Oriented Template Matching Algorithm Using Normalized Cross-Correlation Criterion for Tracking Aerial Image Scene

Authors: Jigg Pelayo, Ricardo Villar

Abstract:

Leaning on the development of aerial laser scanning in the Philippine geospatial industry, researches about remote sensing and machine vision technology became a trend. Object detection via template matching is one of its application which characterized to be fast and in real time. The paper purposely attempts to provide application for robust pattern matching algorithm based on the normalized cross correlation (NCC) criterion function subjected in Object-based image analysis (OBIA) utilizing high-resolution aerial imagery and low density LiDAR data. The height information from laser scanning provides effective partitioning order, thus improving the hierarchal class feature pattern which allows to skip unnecessary calculation. Since detection is executed in the object-oriented platform, mathematical morphology and multi-level filter algorithms were established to effectively avoid the influence of noise, small distortion and fluctuating image saturation that affect the rate of recognition of features. Furthermore, the scheme is evaluated to recognized the performance in different situations and inspect the computational complexities of the algorithms. Its effectiveness is demonstrated in areas of Misamis Oriental province, achieving an overall accuracy of 91% above. Also, the garnered results portray the potential and efficiency of the implemented algorithm under different lighting conditions.

Keywords: algorithm, LiDAR, object recognition, OBIA

Procedia PDF Downloads 245
1923 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 133
1922 Translation in Greek and Psychometric Properties of the 9-Item Internet Gaming Disorder Scale-Short Form (IGDS9-Sf)

Authors: Aspasia Simpsi

Abstract:

The aim of this study was to translate into Greek and then validate the psychometric properties of the Internet Gaming Disorder Scale–Short-Form (IGDS9-SF) (Pontes & Griffiths, 2015). This is the first short standardized psychometric tool to assess Internet Gaming Disorder (IGD) according to the DSM-V nine clinical criteria and among the most frequently examined. The translation of the test was done through the process of back-translation. To gain a better insight into the psychometric properties of this test, the questionnaire included demographic questions and the Greek version of the Internet Addiction Test (Young, 1998). The participants of the study were 241 adolescents aged between 12 to 18. They were nationally recruited in Greece through an online survey that was hosted on the platform of Qualtrics. Analysis revealed excellent reliability with Cronbach’s alpha coefficients α = .939 for IGDS9-SF and α = .940 for IAT. The use of Pearson product-moment correlation revealed a significant positive relationship between IGDS9-SF and IAT r (241) =.45, p < .001. Due to inconsistencies in terminology and tests in the field of IGD, what is recommended for future research is a consensus regarding IGD testing and research.

Keywords: internet gaming disorder, IGDS9-SF, psychometric properties, internet addiction

Procedia PDF Downloads 56
1921 Colada Sweet Like Mercy: Gender Stereotyping in Twitter Conversations by Big Brother Naija 2019 Viewers

Authors: Mary-Magdalene N. Chumbow

Abstract:

This study explores how a reality TV show which aired in Nigeria in 2019 (Big Brother Naija - BBN), played a role in enhancing gender-biased conversations among its viewers and social media followers. Thematic analysis is employed here to study Twitter conversations among BBN 2019 followers, which ensued after the show had stopped airing. The study reveals that the show influenced the way viewers and fans engaged with each other, as well as with the show’s participants, on Twitter, and argues that, despite having aired for a short period of time, BBN 2019 was able to draw people together and provide a community where viewers could engage with each other online. Though the show aired on TV, the viewers found a digital space where they could air their views, react to what was happening on the show, as well as simply catch up on action that they probably missed. Within these digital communities, viewers expressed their attractions, disgust and identities, most of these having a form of reference to sexuality and gender identities and roles, as were also portrayed by the show’s producers both on TV and on social media.

Keywords: commodification of bodies, gender stereotypes, Big Brother Naija, social media

Procedia PDF Downloads 133
1920 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 116
1919 Metabolome-based Profiling of African Baobab Fruit (Adansonia Digitata L.) Using a Multiplex Approach of MS and NMR Techniques in Relation to Its Biological Activity

Authors: Marwa T. Badawy, Alaa F. Bakr, Nesrine Hegazi, Mohamed A. Farag, Ahmed Abdellatif

Abstract:

Diabetes Mellitus (DM) is a chronic disease affecting a large population worldwide. Africa is rich in native medicinal plants with myriad health benefits, though less explored towards the development of specific drug therapy as in diabetes. This study aims to determine the in vivo antidiabetic potential of the well-reported and traditionally used fruits of Baobab (Adansonia digitata L.) using STZ induced diabetic model. The in-vitro cytotoxic and antioxidant properties were examined using MTT assay on L-929 fibroblast cells and DPPH antioxidant assays, respectively. The extract showed minimal cytotoxicity with an IC50 value of 105.7 µg/mL. Histopathological and immunohistochemical investigations showed the hepatoprotective and the renoprotective effects of A. digitata fruits’ extract, implying its protective effects against diabetes complications. These findings were further supported by biochemical assays, which showed that i.p., injection of a low dose (150 mg/kg) of A. digitata twice a week lowered the fasting blood glucose levels, lipid profile, hepatic and renal markers. For a comprehensive overview of extract metabolites composition, ultrahigh performance (UHPLC) analysis coupled to high-resolution tandem mass spectrometry (HRMS/MS) in synchronization with molecular networks led to the annotation of 77 metabolites, among which 50% are reported for the first time in A. digitata fruits.

Keywords: adansonia digital, diabetes mellitus, metabolomics, streptozotocin, Sprague, dawley rats

Procedia PDF Downloads 165
1918 Microscopic Analysis of Bulk, High-TC Superconductors by Transmission Kikuchi Diffraction

Authors: Anjela Koblischka-Veneva, Michael Koblischka

Abstract:

In this contribution, the transmission-Kikuchi diffrac-tion (TKD, or sometimes called t-EBSD) is applied to bulk, melt-grown YBa2Cu3O7 (YBCO) superconductors prepared by the MTMG (melt-textured melt-grown) technique and the infiltration (IG) growth technique. TEM slices required for the analysis were prepared by means of focused ion-beam (FIB) milling using mechanically polished sample surfaces, which enable a proper selection of the in-teresting regions for investigations. The required optical transparency was reached by an additional polishing step of the resulting surfaces using FIB-Ga-ion and Ar-ion milling. The improved spatial resolution of TKD enabled the investigation of the tiny Y2BaCuO5 (Y-211) particles having a diameter of about 50-100 nm embedded within the YBCO matrix and of other added secondary phase particles. With the TKD technique, the microstructural properties of the YBCO matrix are studied in detail. It is observed that the matrix shows effects of stress/strain, depending on the size and distribution of the embedded particles, which are important for providing additional flux pinning centers in such superconducting bulk samples. Using the Kernel average misorientation (KAM) maps, the strain induced in the superconducting matrix around the particles, which increases the flux pinning effectivity, can be clearly revealed. This type of analysis of the EBSD/TKD data is, therefore, also important for other material systems, where nanoparticles are embedded in a matrix.

Keywords: electron backscatter Diffraction, transmission Kikuchi diffraction, SEM, YBCO, microstructure, nanoparticles

Procedia PDF Downloads 128
1917 Inventory of Aromatic and Medicinal Plants Used in Natural Cosmetics in Western Algeria

Authors: Faiza Chaib, Yasmina-Nadia Bendahmane, Fatima Zohra Ghanemi

Abstract:

In order to know the traditional use of aromatic and medicinal plants in natural cosmetics, we carried out an ethnobotanical study using an online quiz among the Algerian population residing mainly in western Algeria (Oran, Tlemcen, and Mostaganem). Our study identified 37 plant species used as cosmetic plants, divided into 9 botanical families. The families mainly used and the richest in species are the lamiaceae, the apiecea, and the rutaceae. Our study states that the 5 species with the highest frequency of use and highest citation value are lemon, chamomile, turmeric, garlic, and lavender. Lemon takes first place in the order of frequency. The plants listed have been listed in tables grouping the identification of plants by their scientific and vernacular names, frequency of use, parts used, parts of the body concerned, desired action, as well as the main traditional recipes. This study allowed us to highlight the importance of aromatic plants and to appreciate their traditional practices in natural cosmetics.

Keywords: aromatic plants, ethnobotanical survey, traditional use, natural cosmetics, questionnaire, western Algeria

Procedia PDF Downloads 118